|
Conferences in DBLP
(bliss) 2007 (conf/bliss/2007)
Evolving the Face of a Criminal: How to Search a Face Space More Effectively. [Citation Graph (, )][DBLP]
Accelerating Decision Making Support in Biometric Assistant for Remote Temperature Measures. [Citation Graph (, )][DBLP]
Maximum-Likelihood Watermarking Detection on Fingerprint Images. [Citation Graph (, )][DBLP]
Sinusoidal Shape of a Papillary Line Crosscut. [Citation Graph (, )][DBLP]
Block Model Application for Decision Support Systems. [Citation Graph (, )][DBLP]
Flexible Key Distribution for SCADA Network using Multi-Agent System. [Citation Graph (, )][DBLP]
Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption. [Citation Graph (, )][DBLP]
Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution. [Citation Graph (, )][DBLP]
Frameworks of Indexing Mechanism for Mobile Devices. [Citation Graph (, )][DBLP]
An Approach to Optimize Local Trust Algorithm in SureMsg Service. [Citation Graph (, )][DBLP]
A Practical Proxy Device for Protecting RFID Tag's Identifier. [Citation Graph (, )][DBLP]
SecureGo: A Hardware-Software Co-Protection against Identity Theft in Online Transaction. [Citation Graph (, )][DBLP]
An Intelligent Decision-Making System for Flood Monitoring from Space. [Citation Graph (, )][DBLP]
Multi-Objective Evolutionary Optimizations of a Space-Based Reconfigurable Sensor Network under Hard Constraints. [Citation Graph (, )][DBLP]
An Improved Particle Swarm Optimization Algorithm for Power-Efficient Wireless Sensor Networks. [Citation Graph (, )][DBLP]
An adaptive processing node architecture for validating sensors reliability in a wind farm. [Citation Graph (, )][DBLP]
Making Hardware Soft in Intelligent Systems. [Citation Graph (, )][DBLP]
Modelling of Anticipatory Behaviour for Self-Control and Adaptability with Applications to Autonomous Systems. [Citation Graph (, )][DBLP]
Image Analysis by Means of the Stochastic Matrix Method of Function Recovery. [Citation Graph (, )][DBLP]
Processing Bank Checks with Genetic Programming and Histograms. [Citation Graph (, )][DBLP]
An Improved LDA Approach with DFB Preprocessing for Face Recognition. [Citation Graph (, )][DBLP]
A Multi-Classifier Approach to Modelling Human and Automatic Visual Cognition. [Citation Graph (, )][DBLP]
MAVIS: A Secure Formal Computational Paradigm based on the Mammalian Visual System. [Citation Graph (, )][DBLP]
A Threshold Free Clustering Algorithm for Robust Unsupervised Classification. [Citation Graph (, )][DBLP]
Spread Transform Watermarking for Digital Multimedia Using the Complex Wavelet Domain. [Citation Graph (, )][DBLP]
Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. [Citation Graph (, )][DBLP]
I2S3 the Integrated Intelligent Secure Sensor Systems Project. [Citation Graph (, )][DBLP]
On Some Directions in Security-Oriented Research. [Citation Graph (, )][DBLP]
Artificial Immune Systems -- an Emergent Technology Performing the Defence of Complex Systems. [Citation Graph (, )][DBLP]
Using Genetic Algorithms in Chem-Bio Defense Applications. [Citation Graph (, )][DBLP]
Prediction of Protein Conformation with Potential Applications to Medical Diagnosis and Defence. [Citation Graph (, )][DBLP]
Data Mining Usage in Emboli Detection. [Citation Graph (, )][DBLP]
|